Hi [[ session.user.profile.firstName ]]

Tech Demo - Imperva Application Protection Portfolio

Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
Recorded Feb 21 2017 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer
Presentation preview: Tech Demo - Imperva Application Protection Portfolio

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • DevOps Security Challenges and Solutions Recorded: Jun 24 2018 42 mins
    Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer
    What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of cloud WAF. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment with Cloudentity to provide state of the art protections against application attacks.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI Recorded: Jun 21 2018 43 mins
    Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • Video: Imperva Attack Analytics Overview Recorded: May 14 2018 3 mins
    Imperva
    Imperva Attack Analytics correlates and distills thousands of security events into a few distinct readable narratives. Attack Analytics employs artificial intelligence and machine learning to make the investigation of application security events easy, enabling ITorganizations to mitigate and respond to real security threats quickly and decisively.
  • Combating insider threats and alert fatigue Recorded: May 9 2018 44 mins
    Ziv Grinberg, Product Management and Sachi Sawamura, Product Marketing
    Join us for a short discussion and demo, as we provide an overview of how our CounterBreach behavioral analytics uses machine learning and context rich algorithms to identify the proverbial needle in the alert haystack.
  • Cloud Data Security: Securing Amazon RDS Recorded: Mar 27 2018 34 mins
    Kedar Dhuru – Principal Product Manager, Data Security; Marty Jost - Product Marketing; and Pathik Shah – Sales Engineering
    Take steps to secure your cloud-deployed databases. Join this live demonstration of how to secure RDS with SecureSphere DAM.
  • Part 4: Breach Detection and Notification for the GDPR Recorded: Jan 11 2018 39 mins
    Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva
    The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    • What the General Data Protection Regulation is
    • What the GDPR breach notification requirements are
    • How Imperva CounterBreach can help detect potential data breaches
  • Part 3: Addressing Data Across Borders for the GDPR Recorded: Jan 4 2018 32 mins
    Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager
    One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • Part 2: Pseudonymization and Data Masking for GDPR Recorded: Dec 21 2017 35 mins
    Cheryl Tang, Director of Product Marketing, Imperva and Steve Pomroy, Chief Technologist, Camouflage
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    - What the General Data Protection Regulation (GDPR) is
    - What is pseudonymization and the benefits of pseudonymizing data
    - How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities
  • Part 1: Data Discovery and Classification for the GDPR Recorded: Dec 14 2017 28 mins
    Cheryl Tang - Product Marketing, Imperva .; Mark Pelkoski - Principal SE, Imperva
    This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.

    In this webinar we’ll provide:

    - An overview of General Data Protection Regulation (GDPR)
    - Who does it impact?
    - What are the data protection principles
    - What are the primary data security requirements
    - An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
  • Tech Demo: API Security with Imperva SecureSphere Recorded: Dec 12 2017 38 mins
    Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert
    APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
  • Video: Machine Learning: Identify the Unpredictable Recorded: Nov 9 2017 10 mins
    Terry Ray, Imperva CTO
    Imperva CTO Terry Ray talks about machine learning and how a deep understanding of databases – user types, data types and database types – allows Imperva to go beyond traditional policy settings to accurately identify unpredictable data access and prevent breaches.
  • Video: Sensitive Data Access: Where Traditional UBA Solutions Fall Short Recorded: Nov 9 2017 13 mins
    Drew Schuil, Vice President of Global Product Strategy
    In today’s global information economy an ever-increasing amount of sensitive data is collected, used, exchanged, analyzed, and retained. And with that comes an ever-increasing number of accidental or intentional data breaches. Identifying inappropriate access to data is paramount in stopping a breach.

    Watch the video about different approaches to User behavior analytics (UBA), the challenges of using traditional UBA solutions to detect and protect against inappropriate access to sensitive data, and a recommended best practice architecture we’ve seen work with customers around the world.
  • Video: Challenges of Insider Threat Detection Recorded: Nov 7 2017 14 mins
    Drew Schuil, Vice President of Global Product Strategy at Imperva
    Insider threat detection and containment of insider threats requires an expert understanding of both users and how they use and access enterprise data.

    This video demonstrates the challenges of insider threat detection and approaches to protect sensitive data and large repositories of data from careless, compromised, and malicious users.
  • Video: Challenges of Big Data Security Recorded: Nov 7 2017 11 mins
    Drew Schuil, Vice President of Global Product Strategy
    Multiple permissions and users, distributed environments, high volume, velocity and variety – leave big data wide-open for breaches. Find out the unique requirements of big data security and what you can do to protect it from threats. View the video to:

    •Learn about the Big Data trends
    •Get insight on the top 3 security challenges to Big Data
    •Find out what requirements to use when evaluating security solutions
  • Secure Your Test & Dev Everywhere, Cloud or On-Prem Recorded: Oct 31 2017 34 mins
    Steve Pomroy, Chief Technologist; Sara Pan, Sr. Product Marketing Manager
    Working with sensitive data complicates security for testing, QA, and app development, not to mention introducing compliance concerns with a host of regulations. In this webinar, we address how to use data masking to help secure data in your test & dev environments, whether on-prem, in the cloud, or outsourced.
  • Tailored Services to Enable GDPR Compliance Recorded: Sep 13 2017 32 mins
    Randy Lee, VP of Worldwide Professional Services
    The new EU General Data Protection Regulation (GDPR) will go into effect in May. In this webinar, Randy Lee (VP of WW Professional Services) provides insight into how to jumpstart your data security compliance efforts for GDPR with data discovery and project planning.

    In this webinar we’ll provide:
    * A brief overview of the GDPR
    * Key data security requirements
    * How to use data discovery and planning services to jumpstart your compliance efforts
  • Tech Demo - AWS Container Security with SecureSphere Recorded: Jul 26 2017 28 mins
    Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • Tech Demo - Detecting Suspicious File Access Recorded: Jun 28 2017 49 mins
    Morgan Gerhart - VP Product Marketing; Jim Hanson - Sr. Sales Engineer
    Our security experts walk through dynamic peer group analysis in CounterBreach 2.0. Tune in to see how to use machine learning to define dynamic peer groups, detect suspicious file access behavior, and dynamically manage access permissions.
  • Tech Demo - Flexible hybrid cloud application security Recorded: May 23 2017 34 mins
    Ajay Uggirala – Director of Product Marketing
    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.
  • Get the Most Out of Your WAF - Tune for Security and Performance Recorded: Apr 20 2017 38 mins
    Michael Malone, Sales Engineer
    Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
    -Alert exception for false positive reduction
    -Profile maintenance for accuracy and efficiency (UBA)
    -Plugins for Dynamic Applications and Profile Tuning
Imperva
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tech Demo - Imperva Application Protection Portfolio
  • Live at: Feb 21 2017 5:00 pm
  • Presented by: Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer
  • From:
Your email has been sent.
or close